Attacks/Breaches
3/7/2011
06:09 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Data Breach Costs Continue Climbing

Some of that cost may be unnecessary, a study has found.

The average cost of a data breach for a U.S. company continues to rise, having reached $7.2 million in 2010.

This represents an increase of 7% from 2009, when the average cost was found to be $6.8 million, according to Symantec which published "2010 Annual Study: U.S. Cost of a Data Breach," and the Ponemon Institute, which conducted the research.

The cost of losing data has grown for U.S. companies every year since 2006.

Larry Ponemon, founder of the Ponemon Institute, says that there was one unusual finding: A rapid response to a breach, which generally involves notifying everyone potentially affected, turns out to be more costly than a slow response.

Increasingly sophisticated data security threats and compliance pressures are pushing organizations to respond as rapidly as possible to data breaches. This is reflected in the finding that malicious attacks have become the most costly cause of breaches. But responding quickly to a breach may not be called for in every instance.

This isn't to say a slow response is always good; rather, it reflects the survey's finding that rapid notification can be a waste of money if subsequent investigation indicates some of those notified were not affected after all.

"In the world of data breaches, telling people your data is lost or stolen and then having to change that doesn't help anyone," said Ponemon in a phone interview.

Quick responders paid $268 per record, an increase of 22% from 2009, while organizations that took more time paid $174 per record, a decrease of 11% from 2009.

Symantec has created an online data breach calculator to help companies assess the potential cost and likelihood of a data breach. Not coincidentally, Symantec sells security solutions, particularly those focused on encryption.

Encryption has become more popular lately because data breach regulations often exempt companies from notification requirements if the lost data was encrypted.

This trend is partially reflected in the survey, which found: an increase in the number of organizations with an "above average IT security posture"; a decrease in breaches due to system failure, lost or stolen devices, and third-party mistakes; and more companies responding faster and putting CISOs in charge of response management.

Negligence remains the most common cause of breach incidents (41%), followed by lost or stolen portable or mobile devices (35%), malicious attacks (31%), and system failure (27%).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3345
Published: 2014-08-28
The web framework in Cisco Transport Gateway for Smart Call Home (aka TG-SCH or Transport Gateway Installation Software) 4.0 does not properly check authorization for administrative web pages, which allows remote attackers to modify the product via a crafted URL, aka Bug ID CSCuq31503.

CVE-2014-3347
Published: 2014-08-28
Cisco IOS 15.1(4)M2 on Cisco 1800 ISR devices, when the ISDN Basic Rate Interface is enabled, allows remote attackers to cause a denial of service (device hang) by leveraging knowledge of the ISDN phone number to trigger an interrupt timer collision during entropy collection, leading to an invalid s...

CVE-2014-4199
Published: 2014-08-28
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.

CVE-2014-4200
Published: 2014-08-28
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, uses 0644 permissions for the vm-support archive, which allows local users to obtain sensitive information by extracting files from this archive.

CVE-2014-0761
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows remote attackers to cause a denial of service (infinite loop or process crash) via a crafted TCP packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.